3.1 Objectives of Research
Following are the various research objectives
1. To study and analyze various security vulnerabilities of vehicular adhoc networks
2. To propose technique for detection of malicious node in the network which are responsible to trigger grayhole attack in the network
3. The proposed technique is based on mutual authentication using technique of traffic monitoring algorithm in networks
4. To implement proposed and existing schemes and compared in terms of throughput, delay and packetloss
3.2 Research Methodology
This work is based on to detect the malicious nodes from the network which are responsible to trigger grayhole attack in the network. The grayhole is the distributed denial of service attack in which
…show more content…
In the first step, the network is deployed with the finite number of vehicle nodes. The fixed bandwidth is allocated to each vehicle node in the network
2. The road side units start analyzing the bandwidth consumption of each vehicle node and node which is using the bandwidth above allocated value will be the malicious nodes
3. In the third step, the road side units check the type of packets which node is sending which is using the bandwidth above the allocated value. When the node is sending the data packets to the victim node, it may be the malicious node
4. In the last step, the nodes which is sending the rouge data packets , if that node will receive control packets from any node then that node will be detected as the malicious node which is responsible to trigger grayhole attack.
3.3 Threshold based Algorithm
• Input : Number of vehicle nodes
• Output : Detection of malicious
1. Assign bandwidth the data rate to each node in the network
2. The source node start sending data to destination node
3. if (bandwidth consumption >threshold )
4. check channel on which data rate is higher than threshold
5. check the node which is sending data packets on the node
6. If (node ==detected)
7. check the node which is sending control
In this paper, we present the first data collection and profiling process result in our research framework. At this time, the second and the third data collection process are still on going. If it is completed, we will conduct the second part of our proposed experiment. The challenges is, we have to obtain an appropriate and enough RAW data that need more prolonged time for trial and error. We have to design scalable devices and computation architecture, since the system proposed will handle high volume of traffic at national level network. A comment and suggestion are welcome.
In simulated network the source node designated as1 initiates the routing procedure by sending RREQ or Route Request message to its surrounding nodes. The RREQ message sent by the source node is denoted in the color green. The other RREQ messages are shown in cyan, yellow, black etc. The source node 1 is sending the RREQ message to its neighbour nodes 5, 6, 9, 11 and 13 and the links are formed shown by the green line. Every time node 5,6,9,11,13 is sending the RREQ message to its neighbour and the links are formed.
In order to avoid this problem, a technique called probability distribution algorithm is introduced. In probability distribution algorithm, the random traffic between the primary network users are analyzed. The nearby nodes behaviors are learnt by the secondary node. The probability of the traffic in the neighboring nodes are studied by the node that tries to transmit data. When the traffic is free then the secondary node establishes the connection. If there is traffic then the secondary node searches for other nodes. Thus the data transmission occurs in this CR
After that, it uses the concept of Bloom filter. Bloom filter is a data structure used to test whether an element is a member of a given set or not. It has a two-dimensional bin table of k levels by m bins with k independent hash functions. It is used to keep track of the recent arrival rates of packets of different destination IP addresses passing through a router within a sampling period t as shown in fig. 4.2. In proposed system, it stores the IP address in data structure and checks it on the behalf of misuse detection method. Once whole of the information is derived, the complete data is analyzed statistically by using association between the nodes respective to the current node.
This presentation discusses an incident known as a denial of service (DoS) as well as an intrusion of the clinic’s network systems. A denial of service (DoS) attack is designed to shut down services which a business needs to operate. This incident caused widespread slowness and outages to internet services and affected the clinic’s capability to properly treat its patients. In this presentation, the incident is examined. The processes to detect, analyze, contain, eradicate and recover from the
In the last week, we just got an idea about the network configuration which we are going to implement in the organization. As per the requirement, we have to implement 150 cameras in the network. So we have to have huge bandwidth in our network to transfer the data from 150 cameras. By implementing the technology called Virtual Local Area Network (VLAN), we can save the bandwidth of our LAN.
First test was performed in order to calculate the recognition percentage of malicious nodes which we saw high performance of our suggested method than other methods. In this test , we increased the number of Sybil peers from 10 to 40 percent and obtained the recognition rate of Sybil attackers through simulation. Based on this test, as the number of Sybil peers increases , false alarm rate will increase and the rate of Sybil attacker detection will decrease.
At the beginning of first period, each node except the sink node sets its both cost fields to and parent node fields to -1, but at the beginning of subsequent periods, each node only sets its both cost field to and no change is made to the parent node fields. The sink node sets its both cost fields to 0 and set its parent node fields to its own ID. At the beginning of this phase, sink node transmit an ADV1 message to all its neighbours. When a node receives an ADV1 message, it does not broadcast its own ADV message to its neighbour immediately. Following steps are executed before sending the ADV1 message to its
In recent times to keep up the network security is a foremost and the network is hacked by the unofficial persons. There are various strategies to extend the safety similar to encryption and firewall. However these strategies are failed to detect the intrusions. For that a new technology is Intrusion detection system. The Intrusion detection is the problem of identifying unauthorized use, misuse and abuse of computer systems. Outside attackers are not only the problem, the threat of authorized users misusing and abusing their privileges is an equally pressing concern. The intrusion detection system used data mining strategies for the network safety, as a result of to guard the network from numerous assaults and malicious site visitors
The origin node is the objective for the attack. In a complicated system there are various origin nodes which are showing a distinct purpose.
false positives. However here facilities for providing information in cases like why aninvariant did not violate network state was not mentioned.Again in distributed system, different nodes communicating with each
The following technical paper “Security Analysis of a Protocol for Pollution Attack Detection” is based on the concept of network coding. Since we have a limited bandwidth it becomes imperative for us to optimize our network in such a way that we can make maximum use of the network resources. Network coding allows us to do that. It achieves this by combining different packets that it receives at a node into one single packet for transmission, instead of simply taking and forwarding the packets. However, network coding is vulnerable to pollution attacks where a single malicious node can disrupt the operation of the complete network. Several protocols to detect pollution attacks have been proposed previously. In the following paper the author has described a new pollution attack detection protocol that extends the existing SpaceMac protocol. This paper describes how we have modelled the protocol in order to carry out a security analysis and presents the results of that analysis.
In this era of technology, everything is available at just one click; Security is a big issue when we talk about networks. Hackers and intruders are getting smarter. There are various methods to secure the network infrastructure and communication over the Internet, for example firewalls, encryption, and virtual private networks. Intrusion detection is a relatively new approach to such techniques. By using intrusion detection, we can collect and use information from known types of attacks and find out if someone is trying to attack the network/host.
In the paper “Vehicular networks and the future of the mobile internet” by Mario Gerla and Leonard Kleinrock, the authors identify the urban Internet infrastructure role that a network of vehicle grids can support with applications that range from email and voice over IP to emergency operations in case of natural disaster, terrorist attacks or other events that can disrupt the operation of wired networks.
Abstract—Mobile Ad-hoc Network (MANET) is a kind of wireless network. A Wireless ad-hoc network is a temporary network with no network infrastructure. The nodes communicate with each other, they co-operate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. Due to the security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Sinkhole Attack. Sinkhole attack is a kind of routing attack in MANET. A sinkhole node tries to attract all the network packets to it-self from all neighboring nodes. This paper focuses on to detect and prevent sinkhole node. By using a hybrid detection technique which combines the advantages of both reactive and proactive routing Protocol to detect the